• Title/Summary/Keyword: 사물 인터넷 기술

Search Result 1,395, Processing Time 0.028 seconds

Development of Convergence Smart Home Platform based on Image Processing and Sensor Network in IoT Environment (IoT환경에서의 센서 네트워크와 영상처리 기반의 융합 스마트 홈 플랫폼 개발)

  • Ahn, Ye-Chan;Lee, Jeong-Pil;Lee, Jae-Wook;Song, Jun-Kwun;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.37-41
    • /
    • 2016
  • In this thesis, we sought to build a home and business environment based on the rapid prototyping technology and network technologies that enabled rapid access to high-speed technologies and technologies. Using the analytic algorithm for image processing techniques, using the analytic algorithm for analyzing and tracking objects in the OpenCV library, trace objects and track objects and control various sensors. It also wants to implement a platform enabling various sensors to collect and record various services by controlling and connecting various sensors through the master Single board and the slave single.

Agricultural Management Innovation through the Adoption of Internet of Things: Case of Smart Farm (사물인터넷에 의한 농업경영혁신 : 스마트농장의 사례)

  • Kim, Joo-Tae;Han, Jong-Soo
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.65-75
    • /
    • 2017
  • Agricultural sector in Korea faces the threat of aging farmers and many other difficulties. Because agriculture is a very less-competitive industry in Korea and many solutions to improve the competitiveness of Korean agriculture should be studied. The advent of Internet of things(IoT) technology makes possible many new industries and business models in the current society. The adoption of this new technology in agriculture can bring about innovations in agricultural production and distribution as $6^{th}$ industry. This paper summarizes the opportunities in IoT and smart farm. The major benefits and obstacles in introducing smart farms are reviewed and the cases of two successful smart farms in Korea are analyzed. Through these case studies, we can recognize the current status and future strategies in Korean smart farms.

A Software Engineering-Based Software Development Progress Analysis in IoT Environment (사물인터넷 환경에서 소프트웨어 공학 기반의 소프트웨어 개발 진척 분석)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.87-92
    • /
    • 2020
  • The surrounding environments in which we live are changing from time to time due to the influence of ICT. At the heart of this change is not only the industrial sector, but it appears in most areas of everyday life. At the center of information and communication technology are software, intelligence, and sensing technology. The government and related organizations are promoting policies to foster various software, and with these policies, the software-related industry is steadily developing. There are positive aspects about software development, but also negative ones. The problems of duplication and progress due to software development have been increasing as the software industry has increased in quantity. In this study, we proposed a more objective method based on software engineering as a solution to problems when problems related to development progress occurred during the software development process.

A Study on Efficient Mixnet Techniques for Low Power High Throughput Internet of Things (저전력 고속 사물 인터넷을 위한 효율적인 믹스넷 기술에 대한 연구)

  • Jeon, Ga-Hye;Hwang, Hye-jeong;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.246-248
    • /
    • 2021
  • Recently data has been transformed into a data economy and society that acts as a catalyst for the development of all industries and the creation of new value, and COVID-19 is accelerating digital transformation. In the upcoming intelligent Internet of Things era, the availability of decentralized systems such as blockchain and mixnet is emerging to solve the security problems of centralized systems that makes it difficult to utilize data safely and efficiently. Blockchain manages data in a transparent and decentralized manner and guarantees the reliability and integrity of the data through agreements between participants, but the transparency of the data threatens the privacy of users. On the other hand, mixed net technology for protecting privacy protects privacy in distributed networks, but due to inefficient power consumption efficiency and processing speed issues, low cost, light weight, low power consumption Internet Hard to use. In this paper, we analyze the limitations of conventional mixed-net technology and propose a mixed-net technology method for low power consumption, high speed, and the Internet of things.

  • PDF

An Explorative Study on the Features of Activity Trackers as IoT based Wearable Devices (사물인터넷 기반 웨어러블 디바이스인 활동량측정기의 특성에 대한 탐색연구)

  • Hong, Suk-Ki
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.93-98
    • /
    • 2015
  • IoT (Internet of Things) is recently burgeoning as business applications as well as ICT itself. Among the business applications of IoT, wearable devices are recognized as a leading area of customer devices. This research first identifies customer needs of activity trackers (fitness trackers), as one of representative wearable devices, and mapping the identified needs with the well-known marketing model of marketing mix (4 P's: Product, Price, Promotion, and Place). Survey was applied to university students for identifying current and potential needs for activity trackers. The needs were classified by 4 P's, and according to the results, different from other IT devices, activity trackers has more potential needs. Moreover, reliable distribution channels, offline and company owned shops were preferred, rather than online shopping mall by third parties. The results would provide some valuable implications to not only designers of activity trackers but also business management.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

An IoT Patent Trend Analysis for Technological Convergence on Hyper Connected Society (초연결시대 기술융합을 위한 사물 인터넷 기술의 특허동향 분석)

  • Rho, Seungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2724-2730
    • /
    • 2015
  • Internet of Things (IoT) is possibly the most widely discussed technological concept in today's technology circles. This technology is expected to dramatically change not only how we work but also how we live. The concept of IoT basically means a web of connected devices which can be controlled over a data network. With cost of technology required to control these devices going down and increasing internet connectivity through smartphones, IoT is expected to be an all pervasive technology in the next 10 years. In this paper, we study the technological landscape of this fast growing technology domain from an Intellectual Property (Patents) perspective. We find that the patent distribution in this domain is very fragmented with the top patent applicants in the field holding around 5% of the total patents. Especially, the US geography has seen the maximum patent filings and is closely followed by the big Asian markets of Japan and Korea.

Classification of Clothing Using Googlenet Deep Learning and IoT based on Artificial Intelligence (인공지능 기반 구글넷 딥러닝과 IoT를 이용한 의류 분류)

  • Noh, Sun-Kuk
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.41-45
    • /
    • 2020
  • Recently, artificial intelligence (AI) and the Internet of things (IoT), which are represented by machine learning and deep learning among IT technologies related to the Fourth Industrial Revolution, are applied to our real life in various fields through various researches. In this paper, IoT and AI using object recognition technology are applied to classify clothing. For this purpose, the image dataset was taken using webcam and raspberry pi, and GoogLeNet, a convolutional neural network artificial intelligence network, was applied to transfer the photographed image data. The clothing image dataset was classified into two categories (shirtwaist, trousers): 900 clean images, 900 loss images, and total 1800 images. The classification measurement results showed that the accuracy of the clean clothing image was about 97.78%. In conclusion, the study confirmed the applicability of other objects using artificial intelligence networks on the Internet of Things based platform through the measurement results and the supplementation of more image data in the future.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Analysis of transmission rate according to LoRaWAN communication distance (LoRaWAN Class B 통신 거리에 따른 전송율 분석)

  • Seo, Euiseong;Jang, Jongwook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.207-211
    • /
    • 2019
  • Research and development are underway to connect the network to all things in the world and to manage the objects through the Internet. The Internet of Things is expected to play an important role in building ecosystem of next generation mobile communication service. The most significant communication technology is LPWAN. In this paper, we analyze the performance according to each data transmission rate to reduce and manage resource waste by using many LPWAN nodes more efficiently in accordance with the demands of the times. The LPWAN communication technology used in this paper was designed based on LoRaWAN, a long-distance low-power wireless platform developed by Semtech, and analyzed by implementing a virtual IoT base using Network Simulator-3.